Skip to main content icon/video/no-internet

Computer hacking involves the manipulation of computer software and hardware or other technologies with criminal or noncriminal intent. Hacking is a phenomenon that has grown in prominence over the past 30 years with the increasing societal dependence on technology for all facets of life. Initially, the notion of computer hacking was nondeviant and associated with the ability to manipulate technology efficiently and effectively in novel ways. Over time, however, the concept of hacking took a more malicious turn due to its use in attacks against consumers and businesses. Today, computer hacking is viewed by many in the general public as one of the most dangerous forms of cybercrime. In fact, hacking has been equated with burglary in the real world due to the fact that a hacker often violates invisible lines of ownership to gain access to sensitive data or ideas. As a consequence, hacking has been incorporated into some states' criminal statutes under existing codes for burglary and robbery.

Hacking is a skill that can be applied in a variety of malicious and nonmalicious ways against both human and technological resources. For instance, hackers who modify programs to subvert security protocols could engage in this act to identify weaknesses in existing security infrastructures and better protect a computer network. This same practice could, however, be used to gain access to protected resources in furtherance of illegal acts ranging from stealing credit cards to acts of terror. The act of hacking is also largely equated with the use of malicious software and highly technical or complex programming. While it is true that some of the most ingenious hacks involve a sophisticated understanding of technology and sufficient skill, many hacks can be completed by preying on human nature. For instance, individuals can guess the password to an e-mail account based on what they know about the owners' lifestyle and family due to the tendency to use personal information to help create easy-to-recall passwords. Alternatively, a password can be obtained by “shoulder surfing,” or surreptitiously looking at individual keystrokes when entering information. Thus, hacking can involve basic techniques as well as more sophisticated applications of knowledge.

Characteristics of Hackers

Although many may think of hackers as being loners who have difficulties associating with others, this stereotype is generally false. Hackers can be gregarious and social and participate in a vibrant subculture that exists primarily in online communities across the world. There are hundreds if not thousands of web forums, blogs, bulletin boards, newsgroups, and e-mail lists related to hacking. Individuals commonly belong to many communities at once to stay abreast of changing technologies and innovative hacks. The information provided by others in online environments fosters a deep desire to understand technology at profound levels and acts as a source of inspiration and social support for those with an interest in hacking. The individual hackers who participate in these communities often use handles, or nicknames, to protect their real identity and develop an online persona that expresses themselves and their interests. A handle can also be used as a means to identify hackers in the real world at conferences and local meetings of security or technology clubs.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading